/[winpt]/trunk/Src/wptKeyPropsDlg.cpp
ViewVC logotype

Contents of /trunk/Src/wptKeyPropsDlg.cpp

Parent Directory Parent Directory | Revision Log Revision Log


Revision 48 - (show annotations)
Mon Oct 31 21:14:11 2005 UTC (19 years, 4 months ago) by werner
File size: 9968 byte(s)
More changes.  Compiles again but there are at least gettext issues with
w32-gettext.c.  I can't get a gpg-error build with ENABLE_NLS.

1 /* wptKeyPropsDlg.cpp - WinPT key properties dialog
2 * Copyright (C) 2000, 2001, 2002, 2003, 2005 Timo Schulz
3 *
4 * This file is part of WinPT.
5 *
6 * WinPT is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * WinPT is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with WinPT; if not, write to the Free Software Foundation,
18 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
19 */
20
21 #ifdef HAVE_CONFIG_H
22 #include <config.h>
23 #endif
24
25 #include <windows.h>
26
27 #include "resource.h"
28 #include "wptErrors.h"
29 #include "wptGPG.h"
30 #include "wptCommonCtl.h"
31 #include "wptContext.h" /* for passphrase_s */
32 #include "wptNLS.h"
33 #include "wptDlgs.h"
34 #include "wptTypes.h"
35 #include "wptKeylist.h"
36 #include "wptW32API.h"
37 #include "wptVersion.h"
38 #include "wptKeyEdit.h"
39
40
41 /* Check that the key is not expired or revoked. */
42 static int
43 do_check_key (gpgme_key_t key)
44 {
45 int okay = 0;
46 okay = key->expired;
47 if (!okay)
48 okay = key->revoked;
49 return okay;
50 }
51
52
53 /* Convert a trust integer into a string representation. */
54 static const char*
55 ownertrust_to_string (int val)
56 {
57 const char *inf;
58 int id = val;
59
60 switch (id) {
61 case 1: inf = _("Don't know"); break;
62 case 2: inf = _("I do NOT trust"); break;
63 case 3: inf = _("I trust marginally"); break;
64 case 4: inf = _("I trust fully"); break;
65 case 5:
66 case 6: inf = _("I trust ultimately"); break;
67 default:inf = _("Unknown"); break;
68 }
69
70 return inf;
71 }
72
73
74 /* Generate a unique temp name for the photo which
75 depends on the dialog handle and return it. */
76 static const char*
77 get_photo_tmpname (HWND dlg)
78 {
79 static char buf[64];
80
81 _snprintf (buf, sizeof (buf)-1, "winpt_photo_%08lX.tmp", (DWORD)dlg);
82 return buf;
83 }
84
85
86 /* Load the photo from the key @key */
87 static int
88 keyprops_load_photo (HWND dlg, gpgme_key_t key, gpgme_validity_t *r_valid)
89 {
90 winpt_key_s k;
91 FILE *f;
92 const BYTE *img;
93 DWORD imglen = 0;
94 int pos=0;
95
96 winpt_get_pubkey (key->subkeys->keyid, &k);
97 img = k.ext->attrib.d;
98 imglen = k.ext->attrib.len;
99 if (!k.ext->attrib.validity)
100 get_uat_validity (key->subkeys->keyid, &k.ext->attrib.validity);
101 *r_valid = k.ext->attrib.validity;
102
103 if (!img || !imglen)
104 return -1;
105 f = fopen (get_photo_tmpname (dlg), "wb");
106 if (f) {
107 for (pos = 0; img[pos] != 0x10; pos++)
108 ;
109 pos += 16;
110 fwrite (img + pos, 1, imglen - pos, f);
111 fwrite (img, 1, imglen, f);
112 fclose (f);
113 }
114 return 0;
115 }
116
117
118 /* Display the photo in the image control in the dialog @dlg. */
119 static int
120 keyprops_show_photo (HWND dlg)
121 {
122 RECT r;
123 POINT p;
124 HWND h;
125
126 h = GetDlgItem (dlg, IDC_KEYPROPS_IMG);
127 GetWindowRect (h, &r);
128 p.x = r.left + 5;
129 p.y = r.top - 2;
130 memset (&p, 0, sizeof (p));
131 PTD_jpg_show (h, &p, get_photo_tmpname (dlg));
132
133 return 0;
134 }
135
136
137 /* Return string representation of the key validity. @key. */
138 static const char*
139 get_validity (gpgme_key_t key)
140 {
141 int val;
142 val = key->expired;
143 if (val)
144 return _("Expired");
145 val = key->revoked;
146 if (val)
147 return _("Revoked");
148 val = key->disabled;
149 if (val)
150 return _("Disabled");
151 return get_key_trust2 (NULL, key->uids->validity, 0, 0);
152 }
153
154
155 /* Return the preferred sym. algorithm from @key as a string. */
156 static const char*
157 get_pref_cipher (winpt_key_t k)
158 {
159 const char *sym_prefs=NULL;
160
161 if (k->is_v3)
162 return "IDEA";
163 if (!k->ext->sym_prefs)
164 return "3DES";
165 switch (*k->ext->sym_prefs) {
166 case 1: return "IDEA";
167 case 2: return "3DES";
168 case 3: return "CAST5";
169 case 4: return "Blowfish";
170 case 7:
171 case 8:
172 case 9: return "AES";
173 case 10:return "Twofish";
174 }
175 return "Unknown";
176 }
177
178
179 /* Return true if the key has designated revokers. */
180 static bool
181 check_for_desig_rev (gpgme_key_t key)
182 {
183 winpt_key_s k;
184 memset (&k, 0, sizeof (k));
185 if (!winpt_get_pubkey (key->subkeys->keyid, &k))
186 return k.ext->gloflags.has_desig_rev? true : false;
187 return false;
188 }
189
190
191 /* Print information (name) of the smart card. */
192 static const char*
193 get_card_type (winpt_key_t k)
194 {
195 static char buf[64];
196
197 if (!k->ext->card_type)
198 return "";
199 _snprintf (buf, sizeof (buf)-1, _("Card-Type: %s\r\n"), k->ext->card_type);
200 return buf;
201 }
202
203
204 /* Display the key information for key @k.
205 Return value: gpgme key on success. */
206 static void
207 display_key_info (HWND dlg, winpt_key_t k, gpgme_key_t *r_key)
208 {
209 struct winpt_key_s k2;
210 gpgme_key_t sk, key;
211 char info[512];
212 const char *inf;
213 u32 created, expires;
214
215 memset (&k2, 0, sizeof (k2));
216 if (k->key_pair)
217 winpt_get_seckey (k->keyid, &k2);
218 else
219 winpt_get_pubkey (k->keyid, &k2);
220 sk = k2.ctx;
221 if (sk)
222 k->is_protected = k2.is_protected;
223 if (get_pubkey (k->keyid, &key))
224 BUG (0);
225 created = key->subkeys->timestamp;
226 expires = key->subkeys->expires;
227 _snprintf (info, DIM (info)-1,
228 _("Type: %s\r\n"
229 "Key ID: %s\r\n"
230 "Algorithm: %s\r\n"
231 "Size: %s\r\n"
232 "Created: %s\r\n"
233 "Expires: %s\r\n"
234 "Validity: %s\r\n"
235 "Cipher: %s\r\n"
236 "%s\r\n"),
237 get_key_type (key),
238 k->keyid,
239 get_key_algo (key, 0),
240 get_key_size (key, 0),
241 get_key_created (created),
242 get_key_expire_date (expires),
243 get_validity (key),
244 get_pref_cipher (&k2),
245 get_card_type (&k2));
246
247 SetDlgItemText (dlg, IDC_KEYPROPS_INFO, info);
248 SetDlgItemText (dlg, IDC_KEYPROPS_FPR, get_key_fpr (key));
249 inf = ownertrust_to_string (key->owner_trust);
250 SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
251
252 *r_key = key;
253 }
254
255
256 /* Dialog box procedure to show the key properties. */
257 BOOL CALLBACK
258 keyprops_dlg_proc (HWND dlg, UINT msg, WPARAM wparam, LPARAM lparam)
259 {
260 static winpt_key_t k;
261 static gpgme_key_t key;
262 gpgme_validity_t valid;
263 refresh_cache_s rcs = {0};
264 const char *inf;
265 int rc;
266
267 /* XXX: static variable (k) prevent that the dialog can
268 be opened twice. */
269 switch (msg) {
270 case WM_INITDIALOG:
271 if (!lparam)
272 dlg_fatal_error (dlg, "Could not get dialog param!");
273 k = (winpt_key_t)lparam;
274 #ifndef LANG_DE
275 SetWindowText (dlg, _("Key Properties"));
276 SetDlgItemText (dlg, IDC_KEYPROPS_OT_CHANGE, _("&Change"));
277 SetDlgItemText (dlg, IDC_KEYPROPS_REVOKERS, _("&Revokers"));
278 SetDlgItemText (dlg, IDC_KEYPROPS_CHANGE_PWD, _("Change &Passwd"));
279 SetDlgItemText (dlg, IDC_KEYPROPS_OTINF, _("Ownertrust"));
280 #endif
281
282 display_key_info (dlg, k, &key);
283 if (!keyprops_load_photo (dlg, key, &valid)) {
284 k->has_photo = 1;
285 if (valid < GPGME_VALIDITY_MARGINAL)
286 SetDlgItemText (dlg, IDC_KEYPROPS_IMGINF, _("Photo-ID not validated."));
287 }
288 if (k->key_pair)
289 EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_CHANGE_PWD), TRUE);
290 if (check_for_desig_rev (key))
291 EnableWindow (GetDlgItem (dlg, IDC_KEYPROPS_REVOKERS), TRUE);
292 center_window (dlg, NULL);
293 SetForegroundWindow (dlg);
294 return TRUE;
295
296 case WM_DESTROY:
297 remove (get_photo_tmpname (dlg));
298 break;
299
300 case WM_PAINT:
301 if (k->has_photo)
302 keyprops_show_photo (dlg);
303 break;
304
305 case WM_SYSCOMMAND:
306 if (LOWORD (wparam) == SC_CLOSE)
307 EndDialog (dlg, TRUE);
308 return FALSE;
309
310 case WM_COMMAND:
311 switch (LOWORD (wparam)) {
312 case IDOK:
313 EndDialog (dlg, TRUE);
314 return TRUE;
315
316 case IDC_KEYPROPS_OT_CHANGE:
317 if (do_check_key (key)) {
318 msg_box (dlg, _("The status of this key is 'revoked' or 'expired'.\n"
319 "You cannot change the ownertrust of such keys."),
320 _("WinPT Warning"), MB_ERR);
321 return TRUE;
322 }
323 if( !k->key_pair && key->uids->validity < 3 ) {
324 rc = msg_box( dlg, _("This is a non-valid key.\n"
325 "Modifying the ownertrust has no effect on such keys.\n\n"
326 "Do you really want to continue?"),
327 _("WinPT Warning"), MB_ICONWARNING|MB_YESNO );
328 if (rc == IDNO)
329 return TRUE;
330 }
331 //GetDlgItemText (dlg, IDC_KEYPROPS_OT, info, sizeof info -1);
332 dialog_box_param (glob_hinst, (LPCSTR)IDD_WINPT_KEYEDIT_OWNERTRUST,
333 dlg, (DLGPROC)keyedit_ownertrust_dlg_proc,
334 (LPARAM)k, _("Change Ownertrust"),
335 IDS_WINPT_KEYEDIT_OWNERTRUST);
336 if (k->callback.new_val == -1) { /* Cancel */
337 EndDialog (dlg, FALSE);
338 break;
339 }
340
341 inf = ownertrust_to_string (k->callback.new_val);
342 SetDlgItemText (dlg, IDC_KEYPROPS_OT, inf);
343 msg_box (dlg, _("Ownertrust successfully changed."),
344 _("GnuPG Status"), MB_OK);
345
346 /* XXX: modified ownertrust values can effect the entire
347 WoT so we reload the cache. But this is very slow. */
348 memset (&rcs, 0, sizeof (rcs));
349 rcs.kr_reload = 1; rcs.kr_update = 1; /* reload only keylist */
350 DialogBoxParam (glob_hinst, (LPCSTR)IDD_WINPT_KEYCACHE, dlg,
351 keycache_dlg_proc, (LPARAM)&rcs);
352 return TRUE;
353
354 case IDC_KEYPROPS_CHANGE_PWD:
355 keyedit_change_passwd (k, dlg);
356 return TRUE;
357
358 case IDC_KEYPROPS_REVOKERS:
359 dialog_box_param (glob_hinst, (LPCTSTR)IDD_WINPT_KEYREVOKERS, dlg,
360 key_revokers_dlg_proc, (LPARAM)key,
361 _("Key Revokers"), IDS_WINPT_KEY_REVOKERS);
362 break;
363 }
364 }
365
366 return FALSE;
367 }

Properties

Name Value
svn:eol-style native

[email protected]
ViewVC Help
Powered by ViewVC 1.1.26